Our lightweight approach to comprehensive protection

The first step towards robust protection of your company against cyberattacks does not have to be complex and expensive.
Our approach is based on 3 consecutive steps
Getting Started - Full Transparency
- Free Initial Consultation: We define the scope in an initial consultation. This is free of charge for you.
- Determination of the Status Quo / Threat Analysis: You will receive a fixed price offer for determining the risk and threat situation – the prerequisite for everything else.
- Execution: Together, based on the insights gained and our recommendations, we determine the analyses to be carried out in step 1 and their depth. You will receive a binding and comparable offer.
Our approach in detail
Step 1:
Cyber Security Foundation
Typical Activities
- Audit/Interview: Status quo assessment via checklist
- OSINT – Non-invasive Information Gathering
- (Partially) automated network scans from the outside
- Penetration Tests
- Randomized attack simulation on selected targets
Further Activities
- Assumed-Breach Analysis: Insider threat or successful intrusion as a starting point
- Active Directory Check
- Cloud Pentests
- Application Pentests
- Social Engineering Tests
Result:
Cyber Security Foundation
- Realistic positioning regarding the threats (“Which threats do we have to face?”) and the security situation (“How good are we in IT Security?”)
- Achievement of a defined security level
- Specific recommendations for action and action plan
Step 2:
Cyber Security Boost
Typical Activities
- In-depth vulnerability analyses
- Social Engineering Tests
- Campaigns to raise security awareness
- Red Teaming: Explicit Intrusion Attempts
Further Activities
- Dedicated Cloud Security Analyses
- Compliance Assessments
- Insider Threat Scenario
- Red-/Blue-/Purple-Teaming
Result:
Cyber Security Boost
- Realistic positioning regarding the threats (“Which threats do we have to face?”) and the security situation (“How good are we in IT Security?”)
- Achievement of a defined security level
- Specific recommendations for action and action plan
Step 3:
Cyber Security Resilience
Execution of comprehensive red teaming activities with a scope closely tailored to the requirements. An arsenal of measures is available for selection, such as Advanced Persistent Threat (APT) approaches, physical intrusion, etc.
Result:
Cyber Security Resilience
Maximizing the penetration and sustainability of cyber security across the entire organization.
mgm DeepDive
A Red Teaming Assessment is a comprehensive approach that tests the company's entire security posture, including the responsiveness of the security team.

